CVE-2025-15578

Maypole versions from 2.10 through 2.13 for Perl generates session ids insecurely. The session id is seeded with the system time (which is available from HTTP response headers), a call to the built-in rand() function, and the PID.
Configurations

No configuration.

History

18 Feb 2026, 17:52

Type Values Removed Values Added
Summary
  • (es) Las versiones de Maypole de la 2.10 a la 2.13 para Perl generan identificadores de sesión de forma insegura. El identificador de sesión se inicializa con la hora del sistema (que está disponible en los encabezados de respuesta HTTP), una llamada a la función rand() incorporada y el PID.

17 Feb 2026, 15:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

16 Feb 2026, 22:22

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-16 22:22

Updated : 2026-02-18 17:52


NVD link : CVE-2025-15578

Mitre link : CVE-2025-15578

CVE.ORG link : CVE-2025-15578


JSON object : View

Products Affected

No product.

CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)